نتایج جستجو برای: ssl

تعداد نتایج: 1571  

2000
Xiaodong Lin Johnny W. Wong Weidong Kou

In recent years, protocols have been developed to ensure secure communications over the Internet, e.g., the secure sockets layer (SSL) and secure electronic transaction (SET). Deployment of these protocols incurs additional resource requirements at the client and server. This may have a negative impact on system performance. In this paper, we consider a scenario where users request information ...

2016
Dan Huang Shuang Zhang Ting Zhong Wei Ren Xin Yao Yang Guo Xiao-Chuan Duan Yi-Fan Yin Shu-Shi Zhang Xuan Zhang

Like the anti-angiogenic strategy, anti-vascular mimicry is considered as a novel targeting strategy for glioma. In the present study, we used NGR as a targeting ligand and prepared NGR-modified liposomes containing combretastatin A4 (NGR-SSL-CA4) in order to evaluate their potential targeting of glioma tumor cells and vasculogenic mimicry (VM) formed by glioma cells as well as their anti-VM ac...

2014
Amarnag Subramanya Partha Pratim Talukdar

While labeled data is expensive to prepare, ever increasing amounts of unlabeled data is becoming widely available. In order to adapt to this phenomenon, several semi-supervised learning (SSL) algorithms, which learn from labeled as well as unlabeled data, have been developed. In a separate line of work, researchers have started to realize that graphs provide a natural way to represent data in ...

2010
Myeonggil Choi Nguyen Manh Thang

The multi hop mesh networkan extension of wireless mesh network by ad hoc networkis one promising wireless network architecture in the near future. Securing access network is the first protection against attacker access to network services. Authentication is an essential for securing the access to the network. TLS/SSL (Transport Layer Security/Secure Socket Layer) protocol is one famous secure ...

2011
Lisa X. Lai

The production of singleand mixed-sugar streams and their conversion to bioproducts were studied using sulfite pulping streams as feedstocks. Sulfite pulp, sludge, and spent sulfite liquor (SSL) were utilized because they are concurrently generated alongside of bleached pulp, and because the pulping process renders pretreatment unnecessary. SSL, comprised of mostly monomeric hexose and pentose ...

Journal: :Computer Networks 2003
Chris Lesniewski-Laas M. Frans Kaashoek

A popular technique for reducing the bandwidth load on Web servers is to serve the content from proxies. Typically these hosts are trusted by the clients and server not to modify the data that they proxy. SSL splitting is a new technique for guaranteeing the integrity of data served from proxies without requiring changes to Web clients. Instead of relaying an insecure HTTP connection, an SSL sp...

Journal: :Applied biochemistry and biotechnology 2008
Rita C L B Rodrigues Chenfeng Lu Bernice Lin Thomas W Jeffries

Spent sulfite pulping liquor (SSL) contains lignin, which is present as lignosulfonate, and hemicelluloses that are present as hydrolyzed carbohydrates. To reduce the biological oxygen demand of SSL associated with dissolved sugars, we studied the capacity of Pichia stipitis FPL-YS30 (xyl3Delta) to convert these sugars into useful products. FPL-YS30 produces a negligible amount of ethanol while...

2013
Philippe Balbiani Hans van Ditmarsch Andrey Kudinov

In this paper we introduce public announcements to Subset Space Logic (SSL). In order to do this we have to change the original semantics for SSL a little and consider a weaker version of SSL without the cross axiom. We present an axiomatization, prove completeness and show that this logic is PSPACE-complete. Finally, we add the arbitrary announcement modality which expresses “true after any an...

2011
Keon Jang Sangjin Han Seungyeop Han Sue B. Moon KyoungSoo Park

Secure end-to-end communication is becoming increasingly important as more private and sensitive data is transferred on the Internet. Unfortunately, today’s SSL deployment is largely limited to security or privacycritical domains. The low adoption rate is mainly attributed to the heavy cryptographic computation overhead on the server side, and the cost of good privacy on the Internet is tightly...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید